higotest.gyomu-kaizen.com
Open in
urlscan Pro
183.90.241.18
Malicious Activity!
Public Scan
Submission: On October 11 via automatic, source openphish — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 25th 2022. Valid for: 3 months.
This is the only time higotest.gyomu-kaizen.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Rackspace (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 183.90.241.18 183.90.241.18 | 131965 (XSERVER X...) (XSERVER Xserver Inc.) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 2 |
ASN131965 (XSERVER Xserver Inc., JP)
PTR: sv7497.xserver.jp
higotest.gyomu-kaizen.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
gyomu-kaizen.com
higotest.gyomu-kaizen.com |
79 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 358 |
28 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | higotest.gyomu-kaizen.com |
higotest.gyomu-kaizen.com
|
1 | cdnjs.cloudflare.com |
higotest.gyomu-kaizen.com
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
higotest.gyomu-kaizen.com R3 |
2022-08-25 - 2022-11-23 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://higotest.gyomu-kaizen.com/D2D3i4U/rackspace/index.php?rs=tonyc@sterlingsmithfd.com
Frame ID: 5DE1A1FC5F42B503A86DA0994444E461
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
Rackspace Webmail: Hosted Email for BusinessDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/ |
14 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/files/ |
91 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/files/ |
29 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
blank.gif
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/files/ |
43 B 205 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_20141002.png
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Suspicious-Email-Banner.jpg
higotest.gyomu-kaizen.com/D2D3i4U/rackspace/files/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Rackspace (Online)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery boolean| _wm_redirect function| onFormSubmit object| Webmail object| $Login object| $TEAEncrypt string| _ext_js_path0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
higotest.gyomu-kaizen.com
183.90.241.18
2606:4700::6811:190e
2894fa1d1ebe2f99a165317c3c46ea23a7de28590a1c3965508acaf802e9c9a8
89a15e9c40bc6b14809f236ee8cd3ed1ea42393c1f6ca55c7855cd779b3f922e
8fb7e8af2dd74c64a988cfa7cef028e7fa6a140b05c5b228f7d490a0047b6a28
b88d9397344333b9413e88f5b3ddf644c2d26892f5bd77514e1e82f460634a1c
ee608b4a41a47f8df45dd1d505afb39cb7293e7a33c094b756764a85d67fca47
f167dfd881b45166119fce39b1fa639e925f80e4e7391e3cbe83f843490b7b19
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e